Access Manager

This cool solution explains how Sentinel can be configured to forward events from Sentinel or Access Manager Analytics Server to 3rd party Syslog Servers like Splunk and ArcSight. By default, Splunk runs Syslog on UDP 514 and TCP 1514. These ports may be different in your Splunk environment…

By: vjohari
Oct 3, 2018
4:22 pm
Reads:
583
Score:
Unrated

NetIQ Access Manager 4.4 SP1 and later versions of Access Manager are supported to be deployed in leading public clouds such as AWS and Azure. The NAM_Deploy_AC_IDP_MAG_v1.yml CloudFormation Template (CFT) attached in this tool can be used to deploy the Access Manager components in AWS in the selected VPC This CFT will do the following:…

+ read more

G Nataraj
By: G Nataraj
Aug 24, 2018
10:08 am
Reads:
590
Score:
5

How to enable SAML2 federation on existing java web application? There are many scenarios where in-house applications are developed and have their own authentication mechanism. To enable Single Sign On using SAML2 federation on this kind of application, it needs additional code and configuration. This can be achieved in many ways writing java code, some…

+ read more

By: cstumula
Jul 26, 2018
9:34 am
Reads:
569
Score:
Unrated

Here is a summary of resources available regarding deploying and using Access Manager on Public cloud – AWS and Azure.

Jul 20, 2018
10:03 am
Reads:
443
Score:
Unrated

NetIQ Access Manager 4.4 provides a rich set of REST Endpoints for NAM such as components Administration and OAuth/OpenID Management. EasyNAMClient uses those Rest Endpoints to provide a learning tool to new NAM users. This tool can be used by NAM/OAuth beginners as a starting point to explore NAM REST Endpoints and to write…

Jul 18, 2018
2:11 pm
Reads:
759
Score:
Unrated

NetIQ Access Manager supports the SAML2 bearer grant. Access Manager supports only the authorization grant flow for assertion and the assertion is used for authenticating the user. You can use SAML2 assertions to request an access token. Access Manager validates the assertion and generates the access token for accessing OAuth protected resources. But the…

By: cstumula
Jul 18, 2018
1:45 pm
Reads:
377
Score:
Unrated

Modern application development interacts with multiple services. These services can be internal or external. Most of the services are developed with Oauth2 support. When the user or mobile access a service, that particular service might be interacting with other services either internal or cloud service. To access other services, it needs the access token….

By: cstumula
Jul 13, 2018
12:29 pm
Reads:
379
Score:
Unrated

User Behavioral Analytics (UBA) is a security process that observes the normal patterns of users’ behaviour and uses machine learning algorithms or statistical methods to detect deviations from normal patterns. The premise of UBA is that it is easier to steal user’s credentials than to actually mimic the user’s behaviour once the intruder has taken…

+ read more

By: jmdmajid
Jul 2, 2018
1:50 pm
Reads:
692
Score:
5

In the Access Manager documentation the Port Redirection script works only for SUSE. I have modified the script and added a few more steps to run it on Redhat 7.x, which is using systemd. Follow the steps below…

By: vjohari
Jun 29, 2018
5:18 pm
Reads:
571
Score:
4

Using a SAML 2.0 connection, the service provider (web services or SaaS applications) trusts the identity provider (NAM IDP) to validate the user’s authentication credentials and to send identity information about the authenticated user. The service provider accepts the data and uses it to give the user access to…

Koushik Halder
Jun 20, 2018
8:55 am
Reads:
667
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow